Search results for "Information systems"
showing 10 items of 1926 documents
Digital Volunteers in Disaster Response: Accessibility Challenges
2019
The emergence of the Digital Humanitarian Volunteer (DHV) movements when disaster strikes have drawn the attention of researchers and practitioners in the emergency management and humanitarian domain. While there are established players in this rapidly developing field, there are still unresolved challenges, including accessibility of their digital tools and platforms. The purposes of this paper are twofold. First, it describes the background, impact and future potential of the DHV movement, and discusses the importance of universal design for the digital tools and platforms used for crowdsourcing of crisis information. Second, this paper shows how lack of concern for universal design and a…
How Critical Infrastructure Orients International Relief in Cascading Disasters
2016
Critical infrastructure and facilities are central assets in modern societies, but their impact on international disaster relief remains mostly associated with logistics challenges. The emerging literature on cascading disasters suggests the need to integrate the nonlinearity of events in the analyses. This article investigates three case studies: the 2002 floods in the Czech Republic, Hurricane Katrina in 2005 and the 2011 Tohoku earthquake, tsunami and Fukushima meltdown in Japan. We explore how the failure of critical infrastructure can orient international disaster relief by shifting its priorities during the response. We argue that critical infrastructure can influence aid request and …
Terrorism in the Website
2020
Without any doubt, terrorism causes higher levels of anxiety and very well enhances our fears as never before. The post 9/11 context witnesses the multiplication of xenophobic expressions, such as Islamophobia or tourist-phobia, only to name a few. These expressions result from a culture of intolerance, which not only was enrooted in the ideological core of western capitalism but was accelerated just after 9/11. Some voices emphasize the needs of employing technology to make this world a safer place. This chapter goes in a contradictory direction. The authors focus on the ethical limitations of technologies when they are subordinated to the ideals of zero-risk society. Echoing Sunstein and …
Watermarking for ontologies
2011
In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.
Terrorism communication : characteristics and emerging perspectives in the scientific literature 2002–2011
2013
This paper aims to clarify current knowledge on the contribution of communication to crisis management in the case of terrorism incidents. This is done by means of a systematic review of the scientific literature on terrorism communication over the last 10 years to identify the many challenges facing communication in such crises, and represents the first attempt of its kind. To date, within the literature on terrorism communication, much attention has been paid to chemical, biological, radiological or nuclear hazards. Terrorism crises are complex and challenging. Preparedness for such diverse low-probability high-impact crises can best be included in a wider educative approach. Terrorism cr…
Las normas ISO/IEC como mecanismos de responsabilidad proactiva en el Reglamento General de Protección de Datos
2021
El mercado de la certificación ha experimentado un auge sin precedentes tras la entrada en vigor y ulterior aplicación del RGPD. Ello obliga a poner de relieve la relevancia de estos mecanismos como elementos claves en la prevención de potenciales violaciones de la seguridad de los datos personales. En el presente trabajo examinamos cómo la naturaleza técnica de estos instrumentos ha cedido hacia su corregulación a los efectos de garantizar una adaptación efi ciente a los continuos cambios de una gran tipología de productos, servicios o sistemas. Pretende proporcionarse una panorámica holística sobre la práctica totalidad de estándares que afectan a las dimensiones de privacidad y protecció…
HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication
2020
Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…
Información y comunicación durante los primeros meses de Covid-19. Cronología, infodemia y desinformación, noticias falsas, investigaciones en curso …
2020
The Covid-19 pandemic has introduced challenges throughout the world and is endangering people’s prosperity. To these health, economic, political, and social challenges have been added those related to the management and dissemination of information, mainly concerning its exponential growth, veracity, and dissemination. Providing objective evidence-based information contributes to meeting these challenges. Social media and social networks are playing a key role in informing society about the evolution of the pandemic and progress towards its eradication. However, social networks are also a vehicle for the transmission of biased or false news that can endanger people’s health. Information pr…
Enabling openness of valuable information resources: Curbing data subtractability and exclusion
2019
In this paper we investigate how data openness can be made possible in communal settings. We adopt a utility perspective that foregrounds the use value of data, conceptualizing them as “goods.” On the basis of this conceptualization we explore 2 key goods' attributes: subtractability and exclusion. Our theoretical basis is built upon concepts from the theory of the commons, power theorizing, and notions related to data and information. Empirically, we investigate openness in the genetics domain through a longitudinal study of the evolving communal infrastructure for data related to 2 genes influencing women's susceptibility to breast and ovarian cancer (BRCA1 and BRCA2). We follow the conti…
miRToolsGallery: a tag-based and rankable microRNA bioinformatics resources database portal
2017
Abstract Hundreds of bioinformatics tools have been developed for MicroRNA (miRNA) investigations including those used for identification, target prediction, structure and expression profile analysis. However, finding the correct tool for a specific application requires the tedious and laborious process of locating, downloading, testing and validating the appropriate tool from a group of nearly a thousand. In order to facilitate this process, we developed a novel database portal named miRToolsGallery. We constructed the portal by manually curating > 950 miRNA analysis tools and resources. In the portal, a query to locate the appropriate tool is expedited by being searchable, filterable and …